Systems | Development | Analytics | API | Testing

Microservice Observability with Kong Mesh

Microservice Observability with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed Koshok demonstrates how Kong Mesh enables you to monitor and troubleshoot your microservices in real-time. Kong Mesh is a service mesh built on top of the Envoy proxy that provides advanced observability features for microservices. With Kong Mesh, you can collect telemetry data, trace requests across multiple services, and visualize service dependencies.

Managing the Cost and Complexity of Hybrid Cloud Infrastructure

More enterprises are striving to become data-driven so they deliver greater value to their customers, shareholders, employees and society at large. But many are still struggling with data infrastructure. To reap the benefits, learn how companies are solving key challenges, from managing the rapid growth of data to ensuring security and compliance, in this discussion with Dan McConnell, SVP of product management, Enterprise Infrastructure.

API Discovery and Consumption with Kong Enterprise

API Discovery and Consumption with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. Discover how Kong Enterprise provides a consistent approach and experience for API publishing and consumption. In this video, Ahmed Koshok demonstrates how developers can easily browse, test, and deploy services through the API catalog, plus a shares a tutorial on how developers can create your own credentials and access the services you need in a self-service manner.

Zero-trust security with Kong Mesh

Zero-trust security with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed explains the core concepts of zero-trust security and demonstrates how Kong Mesh enables you to implement zero-trust security for your microservices. Kong Mesh is a service mesh built on top of the Envoy proxy that provides secure communication between microservices. With Kong Mesh, you can encrypt traffic between services, implement fine-grained access controls, and enforce security policies at the network layer.

Automating API Creation with Kong Enterprise

Automating API Creation with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed demonstrates how to maintain a stable environment while implementing automation using Kong Enterprise. He discusses the necessary guard rails and policies required to ensure an API is properly documented and that policies are injected, plus the importance of testing an API in Insomnia.REST to verify its end points.

Jet Reports for Dynamics 365 F&SCM

Jet Reports provides easy to use financial reporting in Excel for D365F&SCM that can be refreshed near real-time, on demand, with the click of a button. Easy-to-configure, pre-built templates get users up and running fast without having to understand complex Dynamics data structures. Access, share, and organize reports on the web to have the accurate answers you need from anywhere.

What's new in Kong Ingress Controller 2.9 - Kubernetes Events integration #kubernetes #ingress #kic

This tutorial will dive into the seamless integration with Kubernetes Events with KIC 2.9! We’re all familiar with browsing through logs to diagnose why things aren’t working. With this release, we’ve added the KongConfigurationApplyFailed, which means you can see all your problem resources with a single kubectl query. @ViktorGamo, a principal developer advocate at Kong, will guide you through a new feature.